“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with
The calculus course is a critical course for science, technology, engineering, and math
majors. This course sets the stage for many majors and is where students see the beauty of
mathematics, encouraging them to take upper-level math courses.
In a calculus market-research study conducted in 2008, calculus faculty...
System Design for Telecommunication Gateways provides a thorough review of designing telecommunication network equipment based on the latest hardware designs and software methods available on the market. Focusing on high-end efficient designs that challenge all aspects of the system architecture, this book helps readers to understand a...
Newly promoted CISOs rapidly realize that the scope of the position they have taken on
is often beyond what they have been prepared for. The nature of securing an enterprise
is daunting and overwhelming. There are no simple checklists or roadmaps for success.
Many of the technical security skills a CISO has acquired during the early...
Using database-driven web pages or web content management (WCM) systems to manage increasingly diverse web content and to streamline workflows is a commonly practiced solution recognized in libraries to-day. However, limited library web content management models and funding constraints prevent many libraries from purchasing commercially...
Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern...
You’re beyond the basics—so dive in and really put your spreadsheet skills to work! This supremely organized reference is packed with hundreds of timesaving solutions, troubleshooting tips, and workarounds. It’s all muscle and no fluff. Learn how the experts tackle Excel 2013—and challenge yourself to new...
If there's anything the recession of 2009 taught us, it was the importance of investing in our customers, but when was this any different? So says Joseph Jaffe, bestselling author of Life After the 30-Second Spot and Join the Conversation, and a leading expert and...
This text was designed for a one-semester course that covers the essential topics
needed for a fundamental understanding of basic statistics and its applications in
the fields of...
Generate Better, Faster Results— Using Less Capital and Fewer Resources!
“[The High-Velocity Edge] contains ideas that form the basis for structured continuous learning and improvement in every aspect of our lives. While this book is tailored to business leaders, it should be read by high school seniors,...
In modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail.
Guerraoui and Rodrigues present an introductory description of...
In today's economy, maximizing the performance of every employee is critical to business survival and growth. Gen Y—sometimes called Millennials—provides an enticing opportunity for employers to increase their short-term profitability and create a long-term competitive advantage. Almost 80 million strong, Gen Y is the fastest...